Skip to main content

General

TLS Certificates

Find, import, generate, and activate certificates from Certificate Store.

Use Administration → Certificate Store to manage the certificates used by the Management Console, edge services, OPC UA, and certificate-based outbound integrations.

If you open a new installation before importing your own certificate, Proxus creates a starter self-signed certificate automatically so the system can come up securely. You can keep using it for internal environments, or replace it later with a certificate from your own CA or public provider.

When you use this page

  • Change the HTTPS certificate used by the Management Console
  • Import a Cloudflare Origin Certificate or another PEM/PFX certificate
  • Generate a self-signed certificate for a test or internal deployment
  • Assign client certificates to AWS IoT Core, MQTT, Sparkplug B, or OPC UA
  • Manage trusted and rejected certificates for OPC UA security flows

Certificate Store list view
Certificate Store list view

Start here

1. Import a certificate you already have

Use Upload Certificate when the certificate already exists outside Proxus.

Common import options:

  • PFX / PKCS#12 if the certificate already includes the private key
  • PEM certificate + private key for services such as Cloudflare Origin Certificates
  • Public certificate only when you are importing a trust certificate and no private key is needed
warning
Private key requirement

A certificate can be used as the default HTTPS certificate only if it includes the associated private key. If Has Private Key is false, Proxus can store the certificate for trust or reference purposes, but it cannot terminate HTTPS with it.

2. Generate a self-signed certificate

Use Generate Self-Signed when you want Proxus to create a certificate for you.

  • This is a practical option for labs, internal pilots, and isolated networks
  • The generated certificate is stored in Certificate Store
  • You can later replace it with a certificate issued by your organization or provider

3. Make a certificate the active HTTPS certificate

Select the certificate and choose Set as Default.

What happens when you change it:

  • Proxus prepares a new protected key set for the selected certificate
  • Existing browser sessions and cookies are expected to expire
  • After restart, the Management Console starts with the new certificate

This is designed to prevent the restart failures that usually happen when a system switches certificates but still tries to open protected keys created by the old one.

Certificate Store detail view
Certificate Store detail view

Cloudflare: Full (strict) checklist

For Cloudflare Full (strict), the upload must include both the certificate and the private key.

Recommended steps:

  1. In Cloudflare, create or renew an Origin Certificate
  2. Copy the Origin Certificate text into a .pem file
  3. Copy the Private Key text into a separate .key file
  4. Upload both files together in the Certificate Store
  5. Confirm that Has Private Key is enabled
  6. Set the certificate as the default platform certificate
  7. Restart the UI service

If you upload only the public certificate, Proxus can store it, but it cannot use it as the active HTTPS certificate.

lightbulb
Cloudflare SSL mode

After importing a Cloudflare Origin Certificate with its private key and setting it as default, use Full (strict) in Cloudflare. Flexible mode is only a temporary fallback and does not validate TLS on the origin server.

Using certificates in integrations

When an integration needs a client certificate, select it from the integration parameter editor. The certificate stays in Certificate Store and Proxus prepares the runtime material automatically.

Typical examples:

  • AWS IoT Core: choose the client certificate from the parameter editor
  • MQTT / Sparkplug B: choose a TLS client certificate
  • OPC UA: choose an application certificate and, if needed, a trusted server certificate

You do not need to manage runtime certificate payload fields manually.

OPC UA trust management

Use the Trust and Reject actions to manage certificates used in OPC UA security flows.

Typical scenarios:

  • Promote a previously rejected server certificate to trusted
  • Keep public trust certificates without exposing private key material
  • Review which profiles use a certificate as a trusted server certificate

Configuration notes

Certificate Store manages the certificate material itself. In Proxus-config.toml, you normally only define which ports should listen with HTTPS.

Typical example:

[Service]
UI-Port = "80"
UI-HTTPS-Port = "443"
WEBApi-Port = "8082"
Server-Port = "8083"

Use UI-HTTPS-Port, WEBApi-HTTPS-Port, or Server-HTTPS-Port only for the services that should expose HTTPS. The certificate itself is selected from the UI.

After you replace a certificate

When the active HTTPS certificate changes on the UI or edge side:

  • Proxus detects the certificate rollover
  • Old protected key files are archived automatically
  • A new protected key ring is created for the new certificate

This helps the system recover cleanly after certificate replacement instead of failing on restart because older protected keys can no longer be decrypted.